The black hand in the power bank - the latest coin theft trap exposed
Recently, there have been new routines in the rivers and lakes, and before you have fully recovered your blood, you must pick out this matter and make it clear.
Some small project parties have begun to play the trick of giving gifts - peripherals, power banks, mobile phone accessories, etc., which are benefits on the surface, but in fact they are all traps. As soon as you plug these things in, the device automatically falls.
Technically, these tampered devices will start the stealing program the moment you plug in the cable, extract key data such as private keys and addresses directly from your phone, and then silently send them back to the hacker's server. It is no longer the old routine of obtaining permissions through remote APPs, it is more hidden and direct.
Whether you are using an iPhone or an Android machine, you can't escape this disaster. So whether it's a power bank, data cable or other connected devices, don't touch it as long as the source is unknown - this is not to be too careful, but a necessary rule of survival.
The currency circle is deep and cannot be prevented.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
6 Likes
Reward
6
3
Repost
Share
Comment
0/400
BlockchainFries
· 8h ago
Damn, so outrageous? Power banks can also engage in private keys, and the currency circle is really amazing
View OriginalReply0
AirdropBuffet
· 8h ago
I'll say why so many people have lost coins recently, thanks to Lao Tzu never touching strangers' things
View OriginalReply0
TopBuyerBottomSeller
· 8h ago
Oh my God, this wave of operation is amazing, can the power bank start? The currency circle really dares to do anything
#加密生态动态追踪 $BTC $ETH $BNB
The black hand in the power bank - the latest coin theft trap exposed
Recently, there have been new routines in the rivers and lakes, and before you have fully recovered your blood, you must pick out this matter and make it clear.
Some small project parties have begun to play the trick of giving gifts - peripherals, power banks, mobile phone accessories, etc., which are benefits on the surface, but in fact they are all traps. As soon as you plug these things in, the device automatically falls.
Technically, these tampered devices will start the stealing program the moment you plug in the cable, extract key data such as private keys and addresses directly from your phone, and then silently send them back to the hacker's server. It is no longer the old routine of obtaining permissions through remote APPs, it is more hidden and direct.
Whether you are using an iPhone or an Android machine, you can't escape this disaster. So whether it's a power bank, data cable or other connected devices, don't touch it as long as the source is unknown - this is not to be too careful, but a necessary rule of survival.
The currency circle is deep and cannot be prevented.